Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
ssrfcheck: Server-Side Request Forgery (SSRF) and Incomplete List of Disallowed Inputs
Vulnerability Description
ssrfcheck is a library that checks if a string contains a potential SSRF attack. In 1.3.0 and earlier, ssrfcheck fails to block Server-Side Request Forgery attacks when the target private IP address is encoded as an IPv4-mapped IPv6 address (e.g. http://[::ffff:127.0.0.1]/). The WHATWG URL parser built into Node.js silently normalizes the IPv4 notation inside the brackets to compressed hex form ([::ffff:7f00:1]) before the library's private-IP regex ever runs. The regex was written to match dot-notation only and therefore never matches any real input — all seven IANA private IPv4 ranges, including the AWS/GCP/Azure metadata address 169.254.169.254, are bypassed. Any application using isSSRFSafeURL() to guard HTTP requests made with user-supplied URLs is fully exposed to SSRF.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Vulnerability Type
不完整的黑名单
Vulnerability Title
SSRF Check 安全漏洞
Vulnerability Description
SSRF Check是Felippe Regazio个人开发者的一个检查字符串是否包含潜在的SSRF攻击。 SSRF Check 1.3.0及之前版本存在安全漏洞,该漏洞源于无法阻止IPv4映射IPv6地址格式的服务器端请求伪造攻击。
CVSS Information
N/A
Vulnerability Type
N/A